Received: by 2002:ab2:6a05:0:b0:1f8:1780:a4ed with SMTP id w5csp1679627lqo; Sun, 12 May 2024 13:14:04 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCVsQj5DmVMw4KLILdBCUGIkGYdzlaY0+DLujHbsVG5FYHrIermfFvjJSHpYkO2gWMgeuIqI1K05+avIpAB18ND/i8D/jEn8yOzvu77bQw== X-Google-Smtp-Source: AGHT+IE9GH+0/bt+GfvMRy36DIdw19VwRFXAYNPcLo2JPt2bjeng4gzSVb0FcPJMHfJVpTzrKz11 X-Received: by 2002:a17:907:72c8:b0:a5a:32d2:327c with SMTP id a640c23a62f3a-a5a32d234d2mr581075566b.26.1715544844251; Sun, 12 May 2024 13:14:04 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1715544844; cv=pass; d=google.com; s=arc-20160816; b=fOVL8SVjTDNtrPl30U6/iKuB6SkRzOnZHYDNoGL+m9PuApsI6CEgXu8wvnukZR+A4W kp0LymNPFm3Xe5svQDQ/h31g9QuguBh0kef9C48d+ydHNpXBgAFRJRYJ0aTBgdQWjs0o T96jD2W6CHCDD9VYfymhnTl2caFgjkcDIZqkl2fwXRVcqFUJHo/xY5wXBHTDacakkS1E PchwGIKWl7opcNAzroWTSliQ9HgQJeaWpQFgxlI2Z+2Dnbq+uWD3ul1YXjr0chplzH+5 RFA88bOzShV5pdi8uSpjxSEegWYP/RH6SwdmaT4rLx99hvUh7DairRx75WfuhZRkdXPT aFwA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:date:message-id; bh=InMEFS6s1J6UBydJ8JXHUC5fl4sQ3GUkAJzWt7ARv+o=; fh=UrGyX75l2yRb3IMqAmeEw2e5LZeAyCQ8gL0IoQXMYR4=; b=PzZy5CsJQTbd5LKQhZcOCWMEv66h1XDG4yvQDqygV03QBjJXNgZuGzo6+Yz+nvLwq6 k2ZlPSBrJZKo6mx285imlzZtXOg4Mjpn0IJ++8hSPHhF16OaeMavLiaxObR34n7UhPum H6DoAFLiaDveAlwoR+v5wJaFFU2FD/Oyzp83JzSHMvGL+NjeoHpXOOuH7uvQM1RtNtSZ iEUdUHtFJQ323yiwDvE6UsGcfgnNS67MRjYfOM3CCO7XoqItrbp0XaAmsXAnfaw58g4F yNdIq3t/OkYibV1spSTLsRZ0hUMLtDns/WB+g3GMqa7xZ9S5/LcvHKgmvpDMBphawf26 b4EQ==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; arc=pass (i=1 spf=pass spfdomain=ghiti.fr); spf=pass (google.com: domain of linux-kernel+bounces-176999-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-176999-linux.lists.archive=gmail.com@vger.kernel.org" Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [147.75.80.249]) by mx.google.com with ESMTPS id a640c23a62f3a-a5a280a7400si387430666b.167.2024.05.12.13.14.04 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 12 May 2024 13:14:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-176999-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) client-ip=147.75.80.249; Authentication-Results: mx.google.com; arc=pass (i=1 spf=pass spfdomain=ghiti.fr); spf=pass (google.com: domain of linux-kernel+bounces-176999-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-176999-linux.lists.archive=gmail.com@vger.kernel.org" Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id C1A6B1F21DCD for ; Sun, 12 May 2024 20:14:03 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 2701D537E9; Sun, 12 May 2024 20:13:55 +0000 (UTC) Received: from relay8-d.mail.gandi.net (relay8-d.mail.gandi.net [217.70.183.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id AA4CE1CAB3 for ; Sun, 12 May 2024 20:13:50 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=217.70.183.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1715544834; cv=none; b=IVKLOTzX8xPflx8qUnpsNiZegmvz2Tt5zaLHkeWtWCPCvelz2fsqLDkt7QyFp+YoMP4FIl1KwA3y3A/ezfSAa7Or2h85wrK68zkP5gooeueypJhj5E5ATvR+/AR7gH5MY9ygNCDDzDSi9/AVcWh2ltlkct9awQtr+je3VDiC61k= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1715544834; c=relaxed/simple; bh=n8oA1xkjArMGOnYfZNb5Ry0+r1BBNJPH94yslSEDpB8=; h=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From: In-Reply-To:Content-Type; b=OT5J/nTfjLtqAEFwYiiTjcrn9qz6XVaLAnbXybOqRbOKL5W3juOrwdXoiJHTF03BEj3Oue5YzWswetvmSO8vBc7hFcEVq+mwVjQm4CN9ajaXAMbzjxnNiP4qdGxrmfdSOBYDmVHH8fDKgA7F3WWaEriV9elOcQGsqWoz7xUY3DU= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=ghiti.fr; spf=pass smtp.mailfrom=ghiti.fr; arc=none smtp.client-ip=217.70.183.201 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=ghiti.fr Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=ghiti.fr Received: by mail.gandi.net (Postfix) with ESMTPSA id 05C981BF203; Sun, 12 May 2024 20:12:42 +0000 (UTC) Message-ID: Date: Sun, 12 May 2024 22:12:33 +0200 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [RFC PATCH 07/12] riscv/mm: prepare shadow stack for init task for kernel cfi Content-Language: en-US To: Deepak Gupta , linux-riscv@lists.infradead.org, linux-kernel@vger.kernel.org, llvm@lists.linux.dev Cc: paul.walmsley@sifive.com, palmer@dabbelt.com, aou@eecs.berkeley.edu, nathan@kernel.org, ndesaulniers@google.com, morbo@google.com, justinstitt@google.com, andy.chiu@sifive.com, hankuan.chen@sifive.com, guoren@kernel.org, greentime.hu@sifive.com, samitolvanen@google.com, cleger@rivosinc.com, apatel@ventanamicro.com, ajones@ventanamicro.com, conor.dooley@microchip.com, mchitale@ventanamicro.com, dbarboza@ventanamicro.com, waylingii@gmail.com, sameo@rivosinc.com, alexghiti@rivosinc.com, akpm@linux-foundation.org, shikemeng@huaweicloud.com, rppt@kernel.org, charlie@rivosinc.com, xiao.w.wang@intel.com, willy@infradead.org, jszhang@kernel.org, leobras@redhat.com, songshuaishuai@tinylab.org, haxel@fzi.de, samuel.holland@sifive.com, namcaov@gmail.com, bjorn@rivosinc.com, cuiyunhui@bytedance.com, wangkefeng.wang@huawei.com, falcon@tinylab.org, viro@zeniv.linux.org.uk, bhe@redhat.com, chenjiahao16@huawei.com, hca@linux.ibm.com, arnd@arndb.de, kent.overstreet@linux.dev, boqun.feng@gmail.com, oleg@redhat.com, paulmck@kernel.org, broonie@kernel.org, rick.p.edgecombe@intel.com References: <20240409061043.3269676-1-debug@rivosinc.com> <20240409061043.3269676-8-debug@rivosinc.com> From: Alexandre Ghiti In-Reply-To: <20240409061043.3269676-8-debug@rivosinc.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-GND-Sasl: alex@ghiti.fr On 09/04/2024 08:10, Deepak Gupta wrote: > Under CONFIG_SHADOW_CALL_STACK, shadow call stack goes into data section. > Although with CONFIG_DYNAMIC_SCS on riscv, hardware assisted shadow stack > are used. Hardware assisted shadow stack on riscv uses PTE.R=0, PTE.W=1 & > PTE.X=0 encodings. Without CONFIG_DYNAMIC_SCS, shadow stack for init is > placed in data section and thus regular read/write encodings are applied > to it. Although with with CONFIG_DYNAMIC_SCS, they need to go into > different section. This change places it into `.shadowstack` section. > As part of this change early boot code (`setup_vm`), applies appropriate > PTE encodings to shadow call stack for init placed in `.shadowstack` > section. > > Signed-off-by: Deepak Gupta > --- > arch/riscv/include/asm/pgtable.h | 4 ++++ > arch/riscv/include/asm/sections.h | 22 +++++++++++++++++++++ > arch/riscv/include/asm/thread_info.h | 10 ++++++++-- > arch/riscv/kernel/vmlinux.lds.S | 12 ++++++++++++ > arch/riscv/mm/init.c | 29 +++++++++++++++++++++------- > 5 files changed, 68 insertions(+), 9 deletions(-) > > diff --git a/arch/riscv/include/asm/pgtable.h b/arch/riscv/include/asm/pgtable.h > index 9f8ea0e33eb1..3409b250390d 100644 > --- a/arch/riscv/include/asm/pgtable.h > +++ b/arch/riscv/include/asm/pgtable.h > @@ -197,6 +197,10 @@ extern struct pt_alloc_ops pt_ops __initdata; > #define PAGE_KERNEL_READ_EXEC __pgprot((_PAGE_KERNEL & ~_PAGE_WRITE) \ > | _PAGE_EXEC) > > +#ifdef CONFIG_DYNAMIC_SCS > +#define PAGE_KERNEL_SHADOWSTACK __pgprot(_PAGE_KERNEL & ~(_PAGE_READ | _PAGE_EXEC)) > +#endif > + Not sure the ifdefs are necessary here, but I'll let others jump in. We have a lot of them, so we should try not to add. > #define PAGE_TABLE __pgprot(_PAGE_TABLE) > > #define _PAGE_IOREMAP ((_PAGE_KERNEL & ~_PAGE_MTMASK) | _PAGE_IO) > diff --git a/arch/riscv/include/asm/sections.h b/arch/riscv/include/asm/sections.h > index a393d5035c54..4c4154d0021e 100644 > --- a/arch/riscv/include/asm/sections.h > +++ b/arch/riscv/include/asm/sections.h > @@ -14,6 +14,10 @@ extern char __init_data_begin[], __init_data_end[]; > extern char __init_text_begin[], __init_text_end[]; > extern char __alt_start[], __alt_end[]; > extern char __exittext_begin[], __exittext_end[]; > +#ifdef CONFIG_DYNAMIC_SCS > +extern char __init_shstk_start[], __init_shstk_end[]; > +#endif > +extern char __end_srodata[]; > > static inline bool is_va_kernel_text(uintptr_t va) > { > @@ -31,4 +35,22 @@ static inline bool is_va_kernel_lm_alias_text(uintptr_t va) > return va >= start && va < end; > } > > +#ifdef CONFIG_DYNAMIC_SCS > +static inline bool is_va_init_shadow_stack_early(uintptr_t va) > +{ > + uintptr_t start = (uintptr_t)(kernel_mapping_pa_to_va(__init_shstk_start)); > + uintptr_t end = (uintptr_t)(kernel_mapping_pa_to_va(__init_shstk_end)); > + > + return va >= start && va < end; > +} > + > +static inline bool is_va_init_shadow_stack(uintptr_t va) > +{ > + uintptr_t start = (uintptr_t)(__init_shstk_start); > + uintptr_t end = (uintptr_t)(__init_shstk_end); > + > + return va >= start && va < end; > +} > +#endif You could have used an early flag and have only one function but that's up to you. > + > #endif /* __ASM_SECTIONS_H */ > diff --git a/arch/riscv/include/asm/thread_info.h b/arch/riscv/include/asm/thread_info.h > index 5d473343634b..7ae28d627f84 100644 > --- a/arch/riscv/include/asm/thread_info.h > +++ b/arch/riscv/include/asm/thread_info.h > @@ -63,12 +63,18 @@ struct thread_info { > }; > > #ifdef CONFIG_SHADOW_CALL_STACK > +#ifdef CONFIG_DYNAMIC_SCS > #define INIT_SCS \ > - .scs_base = init_shadow_call_stack, \ > + .scs_base = init_shadow_call_stack, \ > + .scs_sp = &init_shadow_call_stack[SCS_SIZE / sizeof(long)], > +#else > +#define INIT_SCS \ > + .scs_base = init_shadow_call_stack, \ > .scs_sp = init_shadow_call_stack, > +#endif /* CONFIG_DYNAMIC_SCS */ > #else > #define INIT_SCS > -#endif > +#endif /* CONFIG_SHADOW_CALL_STACK */ > > /* > * macros/functions for gaining access to the thread information structure > diff --git a/arch/riscv/kernel/vmlinux.lds.S b/arch/riscv/kernel/vmlinux.lds.S > index 002ca58dd998..cccc51f845ab 100644 > --- a/arch/riscv/kernel/vmlinux.lds.S > +++ b/arch/riscv/kernel/vmlinux.lds.S > @@ -126,6 +126,18 @@ SECTIONS > *(.srodata*) > } > > + . = ALIGN(SECTION_ALIGN); > + __end_srodata = .; > + > +#ifdef CONFIG_DYNAMIC_SCS > + .shadowstack : AT(ADDR(.shadowstack) - LOAD_OFFSET){ > + __init_shstk_start = .; > + KEEP(*(.shadowstack..init)) > + . = __init_shstk_start + PAGE_SIZE; > + __init_shstk_end = .; > + } > +#endif > + > . = ALIGN(SECTION_ALIGN); > _data = .; > > diff --git a/arch/riscv/mm/init.c b/arch/riscv/mm/init.c > index fe8e159394d8..5b6f0cfa5719 100644 > --- a/arch/riscv/mm/init.c > +++ b/arch/riscv/mm/init.c > @@ -713,14 +713,22 @@ static __init pgprot_t pgprot_from_va(uintptr_t va) > if (IS_ENABLED(CONFIG_64BIT) && is_va_kernel_lm_alias_text(va)) > return PAGE_KERNEL_READ; > > +#ifdef CONFIG_DYNAMIC_SCS > + /* If init task's shadow stack va, return write only page protections */ > + if (IS_ENABLED(CONFIG_64BIT) && is_va_init_shadow_stack(va)) { > + pr_info("Shadow stack protections are being applied to for init\n"); > + return PAGE_KERNEL_SHADOWSTACK; > + } > +#endif To avoid the ifdef here, I would hide it inis_va_init_shadow_stack(). > + > return PAGE_KERNEL; > } > > void mark_rodata_ro(void) > { > - set_kernel_memory(__start_rodata, _data, set_memory_ro); > + set_kernel_memory(__start_rodata, __end_srodata, set_memory_ro); > if (IS_ENABLED(CONFIG_64BIT)) > - set_kernel_memory(lm_alias(__start_rodata), lm_alias(_data), > + set_kernel_memory(lm_alias(__start_rodata), lm_alias(__end_srodata), > set_memory_ro); > } > #else > @@ -913,14 +921,21 @@ static void __init create_kernel_page_table(pgd_t *pgdir, > static void __init create_kernel_page_table(pgd_t *pgdir, bool early) > { > uintptr_t va, end_va; > + pgprot_t prot; > > end_va = kernel_map.virt_addr + kernel_map.size; > - for (va = kernel_map.virt_addr; va < end_va; va += PMD_SIZE) > + for (va = kernel_map.virt_addr; va < end_va; va += PMD_SIZE) { > + prot = PAGE_KERNEL_EXEC; > +#ifdef CONFIG_DYNAMIC_SCS > + if (early && is_va_init_shadow_stack_early(va)) > + prot = PAGE_KERNEL_SHADOWSTACK; > +#endif Ditto here to avoid the ifdef, hide it intois_va_init_shadow_stack_early(). > create_pgd_mapping(pgdir, va, > - kernel_map.phys_addr + (va - kernel_map.virt_addr), > - PMD_SIZE, > - early ? > - PAGE_KERNEL_EXEC : pgprot_from_va(va)); > + kernel_map.phys_addr + (va - kernel_map.virt_addr), > + PMD_SIZE, > + early ? The 3 lines above are not modified, so no need to indent them. > + prot : pgprot_from_va(va)); > + } > } > #endif > Apart from the nits above, you can add: Reviewed-by: Alexandre Ghiti Thanks, Alex